[Bug ld/29956] mn10300 linker always triggers LOAD segment with RWX permissions test by default

2023-07-30 Thread sam at gentoo dot org
https://sourceware.org/bugzilla/show_bug.cgi?id=29956

Sam James  changed:

   What|Removed |Added

 CC||sam at gentoo dot org

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug ld/29956] mn10300 linker always triggers LOAD segment with RWX permissions test by default

2023-01-03 Thread hp at sourceware dot org
https://sourceware.org/bugzilla/show_bug.cgi?id=29956

--- Comment #4 from Hans-Peter Nilsson  ---
A maintainer can make the call to add such targets to the clause at
ld/configure.tgt line 48.  Just don't forget to add the bare-metal specifier
(e.g. *-elf) there, for targets where a variant also has with
HW-protection-support, so not to match e.g. *-linux.  To wit, don't follow the
bad pattern of target-*-* there.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug ld/29956] mn10300 linker always triggers LOAD segment with RWX permissions test by default

2023-01-03 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29956

--- Comment #3 from Nick Clifton  ---
(In reply to Mike Frysinger from comment #2)
> is the RWX check useful for ELF (bare-metal) targets in general ?

Eh - it is debatable.  On the one hand, any RWX segment is a potential weak
point that attackers might try to exploit, and programs running on bare metal
may still need to be security aware.

On the other hand, if you are building a bare metal based system then
presumably you know what you are doing and what the potential vulnerabilities
are likely to be.

I do not think that the linker can make a judgement call on this.  It is up to
the programmers and toolchain creators to decide what is best.  There are
linker command line options to disable the warnings, and binutils configure
options to change the default behaviour, so things can be customized.

But correctly identifying "safe" bare metal configurations vs "vulnerable" bare
metal configurations ?  This is something that the linker cannot do.

Overall I think that it is better that the linker defaults to generating these
warnings, and having discussions like this one, than to have the linker default
to ignoring the issue and someone not realizing that there is a potential
problem.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug ld/29956] mn10300 linker always triggers LOAD segment with RWX permissions test by default

2023-01-03 Thread vapier at gentoo dot org
https://sourceware.org/bugzilla/show_bug.cgi?id=29956

--- Comment #2 from Mike Frysinger  ---
is the RWX check useful for ELF (bare-metal) targets in general ?

-- 
You are receiving this mail because:
You are on the CC list for the bug.


[Bug ld/29956] mn10300 linker always triggers LOAD segment with RWX permissions test by default

2023-01-03 Thread nickc at redhat dot com
https://sourceware.org/bugzilla/show_bug.cgi?id=29956

--- Comment #1 from Nick Clifton  ---
Created attachment 14546
  --> https://sourceware.org/bugzilla/attachment.cgi?id=14546=edit
Proposed patch

Hi Guys,

  Here is a possible patch to fix this problem.

  Since the issue affects several ports however, it might be better to find a
  more general solution that only needs to be applied once...

Cheers
  Nick

-- 
You are receiving this mail because:
You are on the CC list for the bug.